-
13561
Rateless spinal codes
Published 2013“…In this paper, we present a novel rateless code, the spinal code, which uses a hash function over the message bits to produce pseudo-random bits that in turn can be mapped directly to a dense constellation for transmission. …”
Get full text
Get full text
Get full text
Get full text
Article -
13562
Animate some novel erasure codes from a web demo
Published 2014“…My program allows user to input data in type of bits and demo how data is encoded and decoded by LRC. …”
Get full text
Final Year Project (FYP) -
13563
AAβ public-key cryptosystem - a practical implementation of the new asymmetric
Published 2013“…Furthermore, to support our understanding by providing a statistical analysis of times taken to implement the key generation, encryption and decryption algorithm for the key sizes 3072, 6144, 9216 and 12288 bits for message spaces of 4n where n = 512, 1024, 1536 and 2048 bits. …”
Get full text
Article -
13564
AAβ public key cryptosystem - a new practical asymmetric implementation based on the square root problem
Published 2012“…Furthermore, to support our understanding by providing a statistical analysis of times taken to implement the key generation, encryption and decryption algorithm for the key sizes 3072, 6144, 9216 and 12288 bits for message spaces of 4n where n = 512, 1024, 1536 and 2048 bits. …”
Get full text
Conference or Workshop Item -
13565
Enhanced AES-CCMP key structure in IEEE 802.11I
Published 2012“…The proposed method modifies AES-CCMP key length from 128 bits to 256 bits through recommending three distinctive solutions including Random Nonce Key, Four Way Handshake alteration and Pseudo Random Function (PRF). …”
Book Section -
13566
Simulation studies of Cu(II) removal from aqueous solution using olive stone
Published 2022-09-01Get full text
Article -
13567
5G network slice for digital real-time healthcare system powered by network data analytics
Published 2021-01-01Get full text
Article -
13568
Analysis of the Existence of Environmental Kuznets Curve: Evidence from India
Published 2022-01-01Get full text
Article -
13569
Parametric simulation and experimental analysis of earth air heat exchanger with solar air heating duct
Published 2016-06-01Get full text
Article -
13570
-
13571
A Mathematical Model for Blood Flow Accounting for the Hematological Disorders
Published 2022-09-01Get full text
Article -
13572
Hardware Implementation Of Rc4a Stream Cipher Algorithm
Published 2007“…The implementation is able to support variable key lengths from 8 bits up to 512 bits. Unlike other stream ciphers, the proposed implementation generates two output streams at a time, whereas others generate only one output stream. …”
Get full text
Thesis -
13573
Fish community of a fringing reef at Mochima National Park, Venezuela
Published 2006-11-01“…La diversidad total fue de 4.54 bits ind–1 y osciló entre 3.33 y 4.25 bits ind–1 con un promedio de 3.86 bits ind–1. …”
Get full text
Article -
13574
-
13575
New Method of Image Steganography Based on Particle Swarm Optimization Algorithm in Spatial Domain for High Embedding Capacity
Published 2019-01-01“…First of all, the secret bits are modified, which are then embedded within the host image. …”
Get full text
Article -
13576
-
13577
-
13578
Cybersecurity - An Agents based Approach?
Published 2017“…In this article the potential of personal security agents (PSA) is suggested as a modular tool to model people, process, bits and atoms (objects) with layers to address trust, privacy and security. …”
Get full text
Article -
13579
A P300-Based Speller Design Using a MINMAX Riemannian Geometry Scheme and Convolutional Neural Network
Published 2023-01-01“…The results demonstrated that the accuracy (ITR) of the proposed method was 100% (8.9 bits/min) and 97% (8.5 bits/min) on dataset II from BCI-competition II and dataset II from BCI-competition III, respectively.…”
Get full text
Article -
13580
Applied high resolution digital control for universal precision systems
Published 2009Get full text
Thesis